Juice Jacking: Security Issues and Improvements in USB Technology
Debabrata Singh,
Anil Kumar Biswal,
Debabrata Samanta,
Dilbag Singh and
Heung-No Lee
Additional contact information
Debabrata Singh: Department of Computer Application, Institute of Technical Education and Research (ITER), Siksha ‘O’Anusandhan (SOA) Deemed to be University, Bhubaneswar 751030, Odisha, India
Anil Kumar Biswal: Department of Computer Science and Engineering, Institute of Technical Education and Research (ITER), Siksha ‘O’Anusandhan (SOA) Deemed to be University, Bhubaneswar 751030, Odisha, India
Debabrata Samanta: Department of Computer Science, CHRIST University, Bangalore 560029, Karnataka, India
Dilbag Singh: School of Electrical Engineering and Computer Science, Gwangju Institute of Science and Technology, Gwangju 61005, Korea
Heung-No Lee: School of Electrical Engineering and Computer Science, Gwangju Institute of Science and Technology, Gwangju 61005, Korea
Sustainability, 2022, vol. 14, issue 2, 1-17
Abstract:
For a reliable and convenient system, it is essential to build a secure system that will be protected from outer attacks and also serve the purpose of keeping the inner data safe from intruders. A juice jacking is a popular and spreading cyber-attack that allows intruders to get inside the system through the web and theive potential data from the system. For peripheral communications, Universal Serial Bus (USB) is the most commonly used standard in 5G generation computer systems. USB is not only used for communication, but also to charge gadgets. However, the transferal of data between devices using USB is prone to various security threats. It is necessary to maintain the confidentiality and sensitivity of data on the bus line to maintain integrity. Therefore, in this paper, a juice jacking attack is analyzed, using the maximum possible means through which a system can be affected using USB. Ten different malware attacks are used for experimental purposes. Various machine learning and deep learning models are used to predict malware attacks. An extensive experimental analysis reveals that the deep learning model can efficiently recognize the juice jacking attack. Finally, various techniques are discussed that can either prevent or avoid juice jacking attacks.
Keywords: cyber-attack; malicious code; USB code; security; hacker; keystroke dynamics; authentication (search for similar items in EconPapers)
JEL-codes: O13 Q Q0 Q2 Q3 Q5 Q56 (search for similar items in EconPapers)
Date: 2022
References: View complete reference list from CitEc
Citations:
Downloads: (external link)
https://www.mdpi.com/2071-1050/14/2/939/pdf (application/pdf)
https://www.mdpi.com/2071-1050/14/2/939/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jsusta:v:14:y:2022:i:2:p:939-:d:724924
Access Statistics for this article
Sustainability is currently edited by Ms. Alexandra Wu
More articles in Sustainability from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().